
Anomaly based Intrusion Detection System
Author(s) -
M. Arslan Tariq
Publication year - 2019
Publication title -
international journal for electronic crime investigation
Language(s) - English
Resource type - Journals
eISSN - 2616-6003
pISSN - 2522-3429
DOI - 10.54692/ijeci.2019.030336
Subject(s) - hacker , intrusion detection system , computer security , cloud computing , computer science , confidentiality , secrecy , anomaly detection , information security , operating system , data mining
In the digital World full of hackers and scammers, data security is what everyone needs the most. Hackers and scammers invent new ways of stealing information on daily basis. A method to come up with more precise system is Intrusion Detection system. IDS is todays need because, it helps the individuals to keep up their confidentiality and integrity. Intrusions, that disturbs the security and secrecy of the system, has become major concern for many organizations. The logic and ways Intrusion Detection System uses are related to these days. Through cloud computing, Intrusion Detection System has creäted a world where it can flourish and be most operative. By means of cloud computing, the fundament has engrossed with the Intrusion Detection technology.